Debian Bug report logs - #422603
ca-certificates: /etc/ssl/certs/cacert.org.pem is now a broken symlink

version graph

Package: ca-certificates; Maintainer for ca-certificates is Julien Cristau <jcristau@debian.org>; Source for ca-certificates is src:ca-certificates (PTS, buildd, popcon).

Reported by: Mike Frysinger <vapier@gentoo.org>

Date: Mon, 7 May 2007 10:33:05 UTC

Severity: normal

Found in version ca-certificates/20070303

Fixed in versions ca-certificates/20080809, 20080809

Done: Philipp Kern <pkern@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Fumitoshi UKAI <ukai@debian.or.jp>:
Bug#422603; Package ca-certificates. (full text, mbox, link).


Acknowledgement sent to Mike Frysinger <vapier@gentoo.org>:
New Bug report received and forwarded. Copy sent to Fumitoshi UKAI <ukai@debian.or.jp>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Mike Frysinger <vapier@gentoo.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: ca-certificates: /etc/ssl/certs/cacert.org.pem is now a broken symlink
Date: Mon, 7 May 2007 06:31:12 -0400
Package: ca-certificates
Version: 20070303
Severity: normal

it seems that with the fixing of #350282, a broken symlink has been left
behind:
/etc/ssl/certs/cacert.org.pem
this points to:
/usr/share/ca-certificates/cacert.org/cacert.org.crt
but has since been renamed to:
/usr/share/ca-certificates/cacert.org/root.crt

related issues: #413766 #415125

-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.20.7
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages ca-certificates depends on:
ii  debconf [debconf-2.0]         1.5.11     Debian configuration management 
sy
ii  openssl                       0.9.8e-4   Secure Socket Layer (SSL) binary 
a

ca-certificates recommends no packages.

-- debconf information:
  ca-certificates/enable_crts: brasil.gov.br/brasil.gov.br.crt, 
cacert.org/class3.crt, cacert.org/root.crt, debconf.org/ca.crt, 
mozilla/ABAecom_=sub.__Am._Bankers_Assn.=_Root_CA.crt, 
mozilla/AOL_Time_Warner_Root_Certification_Authority_1.crt, 
mozilla/AOL_Time_Warner_Root_Certification_Authority_2.crt, 
mozilla/AddTrust_External_Root.crt, 
mozilla/AddTrust_Low-Value_Services_Root.crt, 
mozilla/AddTrust_Public_Services_Root.crt, 
mozilla/AddTrust_Qualified_Certificates_Root.crt, 
mozilla/America_Online_Root_Certification_Authority_1.crt, 
mozilla/America_Online_Root_Certification_Authority_2.crt, 
mozilla/Baltimore_CyberTrust_Root.crt, mozilla/Certum_Root_CA.crt, 
mozilla/Comodo_AAA_Services_root.crt, 
mozilla/Comodo_Secure_Services_root.crt, 
mozilla/Comodo_Trusted_Services_root.crt, 
mozilla/Digital_Signature_Trust_Co._Global_CA_1.crt, 
mozilla/Digital_Signature_Trust_Co._Global_CA_2.crt, 
mozilla/Digital_Signature_Trust_Co._Global_CA_3.crt, 
mozilla/Digital_Signature_Trust_Co._Global_CA_4
 .crt, mozilla/Entrust.net_Global_Secure_Personal_CA.crt, 
mozilla/Entrust.net_Global_Secure_Server_CA.crt, 
mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt, 
mozilla/Entrust.net_Secure_Personal_CA.crt, 
mozilla/Entrust.net_Secure_Server_CA.crt, mozilla/Equifax_Secure_CA.crt, 
mozilla/Equifax_Secure_Global_eBusiness_CA.crt, 
mozilla/Equifax_Secure_eBusiness_CA_1.crt, 
mozilla/Equifax_Secure_eBusiness_CA_2.crt, 
mozilla/GTE_CyberTrust_Global_Root.crt, mozilla/GTE_CyberTrust_Root_CA.crt, 
mozilla/GeoTrust_Global_CA.crt, mozilla/GlobalSign_Root_CA.crt, 
mozilla/IPS_CLASE1_root.crt, mozilla/IPS_CLASE3_root.crt, 
mozilla/IPS_CLASEA1_root.crt, mozilla/IPS_CLASEA3_root.crt, 
mozilla/IPS_Chained_CAs_root.crt, mozilla/IPS_Servidores_root.crt, 
mozilla/IPS_Timestamping_root.crt, mozilla/QuoVadis_Root_CA.crt, 
mozilla/RSA_Root_Certificate_1.crt, mozilla/RSA_Security_1024_v3.crt, 
mozilla/RSA_Security_2048_v3.crt, mozilla/Security_Communication_Root_CA.crt, 
mozilla/Sonera_Class_1_Root_CA.crt, moz
 illa/Sonera_Class_2_Root_CA.crt, mozilla/Staat_der_Nederlanden_Root_CA.crt, 
mozilla/TC_TrustCenter__Germany__Class_2_CA.crt, 
mozilla/TC_TrustCenter__Germany__Class_3_CA.crt, 
mozilla/TDC_Internet_Root_CA.crt, mozilla/TDC_OCES_Root_CA.crt, 
mozilla/Thawte_Personal_Basic_CA.crt, 
mozilla/Thawte_Personal_Freemail_CA.crt, 
mozilla/Thawte_Personal_Premium_CA.crt, mozilla/Thawte_Premium_Server_CA.crt, 
mozilla/Thawte_Server_CA.crt, mozilla/Thawte_Time_Stamping_CA.crt, 
mozilla/UTN-USER_First-Network_Applications.crt, 
mozilla/UTN_DATACorp_SGC_Root_CA.crt, 
mozilla/UTN_USERFirst_Email_Root_CA.crt, 
mozilla/UTN_USERFirst_Hardware_Root_CA.crt, 
mozilla/UTN_USERFirst_Object_Root_CA.crt, mozilla/ValiCert_Class_1_VA.crt, 
mozilla/ValiCert_Class_2_VA.crt, 
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority.crt, 
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G2.crt, 
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt, 
mozilla/Verisign_Class_1_Publi
 c_Primary_OCSP_Responder.crt, 
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority.crt, 
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G2.crt, 
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt, 
mozilla/Verisign_Class_2_Public_Primary_OCSP_Responder.crt, 
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority.crt, 
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.crt, 
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt, 
mozilla/Verisign_Class_3_Public_Primary_OCSP_Responder.crt, 
mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G2.crt, 
mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G3.crt, 
mozilla/Verisign_RSA_Secure_Server_CA.crt, 
mozilla/Verisign_Secure_Server_OCSP_Responder.crt, 
mozilla/Verisign_Time_Stamping_Authority_CA.crt, 
mozilla/Visa_International_Global_Root_2.crt, 
mozilla/Visa_eCommerce_Root.crt, mozilla/beTRUSTed_Root_CA-Baltimore
 _Implementation.crt, mozilla/beTRUSTed_Root_CA.crt, 
mozilla/beTRUSTed_Root_CA_-_Entrust_Implementation.crt, 
mozilla/beTRUSTed_Root_CA_-_RSA_Implementation.crt, 
quovadis.bm/QuoVadis_Root_Certification_Authority.crt, 
signet.pl/signet_ca1_pem.crt, signet.pl/signet_ca2_pem.crt, 
signet.pl/signet_ca3_pem.crt, signet.pl/signet_ocspklasa2_pem.crt, 
signet.pl/signet_ocspklasa3_pem.crt, signet.pl/signet_pca2_pem.crt, 
signet.pl/signet_pca3_pem.crt, signet.pl/signet_rootca_pem.crt, 
signet.pl/signet_tsa1_pem.crt, spi-inc.org/SPI_CA_2006-cacert.crt, 
spi-inc.org/spi-ca.crt
  ca-certificates/new_crts:
  ca-certificates/trust_new_crts: yes

-------------------------------------------------------



Bug marked as fixed in version 20080809. Request was from Philipp Kern <pkern@debian.org> to control@bugs.debian.org. (Wed, 08 Jul 2009 21:03:11 GMT) (full text, mbox, link).


Reply sent to Philipp Kern <pkern@debian.org>:
You have taken responsibility. (Wed, 08 Jul 2009 21:39:09 GMT) (full text, mbox, link).


Notification sent to Mike Frysinger <vapier@gentoo.org>:
Bug acknowledged by developer. (Wed, 08 Jul 2009 21:39:09 GMT) (full text, mbox, link).


Message #12 received at 422603-done@bugs.debian.org (full text, mbox, reply):

From: Philipp Kern <pkern@debian.org>
To: 422603-done@bugs.debian.org
Subject: Re: Bug#422603: ca-certificates: /etc/ssl/certs/cacert.org.pem is now a broken symlink
Date: Wed, 8 Jul 2009 21:35:43 +0000
[Message part 1 (text/plain, inline)]
Version: 20080809

On Mon, May 07, 2007 at 06:31:12AM -0400, Mike Frysinger wrote:
> it seems that with the fixing of #350282, a broken symlink has been left
> behind:
> /etc/ssl/certs/cacert.org.pem
> this points to:
> /usr/share/ca-certificates/cacert.org/cacert.org.crt
> but has since been renamed to:
> /usr/share/ca-certificates/cacert.org/root.crt
> 
> related issues: #413766 #415125

This has been fixed in 20080809 already, as far as I can see.

Kind regards,
Philipp Kern
[signature.asc (application/pgp-signature, inline)]

Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Thu, 06 Aug 2009 07:29:36 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Tue Jul 16 02:58:05 2024; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.